Skip to main content

Questions tagged [keyloggers]

A software (and sometimes hardware) module which perform keystroke logging (more often called keylogging or "keyloggers"), which is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

Filter by
Sorted by
Tagged with
3 votes
0 answers
50 views

Are there any commercially available (or not) hardware keylogger chip that someone could solder/plug to a phones LCD?

Title says it all. Are there any keylogger chips for phone LCDs?
Gary Oak's user avatar
2 votes
1 answer
1k views

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged. so basically, the bad usb cable and the usb charger is ...
Maxfield's user avatar
  • 157
1 vote
0 answers
118 views

How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective I've come into possession of some data that I'd like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can't tolerate an outsider ...
Frizzle McGrindnose's user avatar
1 vote
1 answer
120 views

Can Firejails protect against malicious links?

I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
Dion's user avatar
  • 131
1 vote
1 answer
317 views

What are the risks of reusing the same passphrase for FDE, user account, and password manager?

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to ...
jth's user avatar
  • 123
0 votes
0 answers
174 views

Can a Remote Desktop software prevent windows 10 keylogger from accessing what is typed on client computer during a session to a remote computer?

The “improve inking and typing” setting in Windows 10 allows Microsoft to send themselves processed samples of what is typed on a machine (not sure if it is processed to remove details as it’s typed ...
AndroidUser558's user avatar
0 votes
1 answer
186 views

Keylogging virtual machine from host

Can a keylogger in a host machine capture keystrokes in virtual OS? I'd like to get into cryptocurrencies but I don't know if my machine (mac) is secure. So I thought I could create a VM for it but I ...
user277849's user avatar
0 votes
0 answers
114 views

Most Secure ways to to authorize clients on their devices that are remotely connected by (AnyDesk, TeamViewer, etc...) without knowing the password

My case is I'm designing an app based on chromium browser powered by Electron . And I need sometimes to log the clients in with some web apps. The password is only visible as dots in browsers by ...
a.badawi's user avatar
1 vote
1 answer
340 views

Is it safe to use a Dell knock-off keyboard? [duplicate]

Purchased a Dell wired keyboard scanned its QR code to check authenticity. The URL was http://dell.vt9999.com/fw.aspx?c=1670918927095916 and it says the product is authentic but link looks suspicious ...
Nilesh Yadav's user avatar
0 votes
0 answers
41 views

Is it possible to be infected without installing anything like said at the beginning of the video? [duplicate]

It seems like a 'crazy' claim that John McAfee makes at the very beginning of this video, is it true? "Over half of all smartphones, both iOS and Android are infected with keystroke logging ...
stackexchanged's user avatar
2 votes
1 answer
2k views

How seriously should we take this commentary from John McAfee? If it's serious, what do we do? [closed]

This question refers to this YouTube video of John McAfee Because videos can disappear, I've provided a screenshot and transcript (transcribed by me, so please forgive errors) What John is saying ...
Stewart's user avatar
  • 353
1 vote
2 answers
147 views

Using Chrome on non-trusted macOS computer

So I'm using an untrusted computer but on a trusted network (my home). The operating-system + hardware are trusted but the Profiles, certificates & software installed in the system are not trusted....
Luca Matteis's user avatar
0 votes
0 answers
49 views

Wondering if a USB dongle for gaming controller could have malware installed [duplicate]

I purchased a usb gaming controller used. It has a usb dongle that plugs into the PC and a I assume its bluetooth. Is it possible for the USB dongle to contain a keylogger that starts up when I plug ...
Eric Anderson's user avatar
0 votes
2 answers
274 views

Is there a type of login security that is keylog and screen capture proof that doesnt require a 2nd device?

I am looking for a login security measure where it is keylog and screen capture proof. Is there some type of login security like a 2FA without the need of a second device, but remembering a pattern or ...
Patoshi パトシ's user avatar
2 votes
1 answer
1k views

Bitwarden and gamecontrollerd on OsX Big Sur

Recently, I came across an issue concerning a daemon named gamecontrollerd in OsX Big Sur. On my laptop I'm running ReiKey (from Objective-See), which aims at identifying possible Key Loggers that ...
FancyPants's user avatar
5 votes
3 answers
1k views

Can a website keylog you outside a virtual machine

I came across a suspicious website called keylog.me (you can already tell from the name). I was as curious as heck to find out what it does, so I got on a VM (Fedora Linux which I reinstalled later) ...
somebody6000's user avatar
1 vote
0 answers
142 views

can I trust apple notebooks or are there some bios level keyloggers from apple/other agency used? [closed]

I need to look for something on deep web but having macbook air, I feel that it could be rooted from apple / reseller - my idea is that there is some chip logging every key stroke and then send it ...
Ondrej's user avatar
  • 11
1 vote
1 answer
735 views

Can keyloggers read what's in a field, or only your keyboard inputs? What about mouse movement?

I thought of a simple way to throw keyloggers off when typing sensitive information into a field, however this method presupposes that the keylogger can't actually read what's in the field, and also ...
Lolpingu's user avatar
1 vote
2 answers
1k views

How to protect my ubuntu linux computer from screen capture programs or keystroke loggers?

I have a Ubuntu home PC. I often use this system to enter passwords to various websites. Some sites also offer a graphical on screen keyboard to protect from keyloggers. However, I suspect that even ...
user15740's user avatar
  • 111
0 votes
1 answer
604 views

Can MDM on an iPhone restrict custom keyboard usage?

I have an iPhone that runs 13.3.1 (latest at this time). It's a corporate phone and has an MDM profile installed. I've been using the phone for almost 2 years now with a custom keyboard (Google ...
Izy-'s user avatar
  • 873
-1 votes
1 answer
169 views

How can you manually bypass admin access (or gain it) and add a program to startup? [closed]

I was looking into keyloggers and wanted to understand how does someone get a keylogger to run every time the target computer is active (obviously a program that targets this purpose, but an ...
RonsJurisdiction's user avatar
20 votes
2 answers
5k views

Can keylogger software exist solely on a keyboard PCB?

I am looking to build a custom keyboard and bring it to work, but the security department is extremely wary of keyloggers, and rightly so. Now, my understanding of hardware keyloggers is that they are ...
darkmnemic's user avatar
1 vote
1 answer
1k views

Keylogger on an SD Card?

Can an SD card be used as a medium of implementing a keylogger? The location of an SD card slot on some laptops is such that it is impossible to see if it contains a card in it unless you deliberately ...
kat's user avatar
  • 411
1 vote
2 answers
244 views

Can you trust your computer devices to be safe to use if they have been in the hands of potential hackers? [duplicate]

Suppose you lose the bag containing your laptop along with its accessories or while travelling the police confiscate all your computer devices, can you safely use all the devices again if you format ...
Linux_user0987's user avatar
0 votes
1 answer
277 views

Was my password copied? [closed]

I work locally with a WordPress site. When I logged in, it looked like the password was highlighted. It went very fast. Half a second maybe. I found it strange that it looked like it was marked, as in ...
fk76's user avatar
  • 1
0 votes
4 answers
526 views

Attacks on password-based encryption

Frequent attacks on password-based encryption are dictionary attacks with special hardware. I suspect that this is the only promising attack on the ciphertext. Is that correct? Another attack ...
BeloumiX's user avatar
  • 256
1 vote
1 answer
742 views

preventing cross iframe key logging in javascript

We have a web application, where other partners can include their pages as iframes. We implemented a server-to-server way of authenticating users for the iframes, but one partner doesn't want to ...
peter's user avatar
  • 113
1 vote
2 answers
293 views

What information can mouse recorders get?

In comparison to keyloggers, mouse recorders do not seem to be able to obtain much sensitive information. For example, passwords, credit card numbers, email addresses, names, passport numbers, etc. ...
Flux's user avatar
  • 963
0 votes
2 answers
379 views

Keylogging host from virtual machine

Can a keylogger in a virtual machine (guest OS) capture keystrokes in host OS? Is there any way to do it?
mustang's user avatar
  • 29
-1 votes
5 answers
3k views

How do keyloggers tell it's a password? (And how to fool them.)

This question also applies to clipboard monitoring. Imagine you are planning to deploy 100,000 copies of a Windows trojan with keylogger functionality. (For the record, I'm not talking about myself ...
sigil's user avatar
  • 139
1 vote
1 answer
359 views

How secure is a Mac if it passes Apple Diagnostics?

Recently I brought my MacBook Air to a Genius Bar to perform a clean MacOS installation. For security purposes, I asked for a hardware check as well. The Genius Bar technician ran Apple Diagnostics, ...
tonychow0929's user avatar
  • 2,267
1 vote
1 answer
244 views

Why it is difficult to write an application to protect 100% against keyloggers?

When you press keystrokes, I suppose you can intercept in low level code all applications that listen and record. Why it cannot be designed a software that protects 100% against keyloggers, simply ...
human being's user avatar
1 vote
1 answer
140 views

Possible to control desktop data activity LED on Windows or Linux for data extraction? [closed]

I am trying to extract data from an air-gapped computer as a project. I already have a working prototype using high frequency sound and a key-logger. I would like to find another way to do it without ...
shelbaz's user avatar
  • 11
2 votes
4 answers
859 views

Can a wifi usb adapter double as a keylogger?

I've read that there are keylogger hardware and thought that usb wifi adapter are hardwares and wondered if they can be hacked to work as a keylogger. I'm just worried that my usb wifi adapter might ...
user avatar
0 votes
1 answer
233 views

Does Apple supply hardware keyloggers? [closed]

I received a brand new Mac laptop for work that is basically ours and doesn’t have to be returned, even after quitting. It was inside the box and sealed. I was wondering if Apple supplies and installs ...
Curiousindividual's user avatar
1 vote
2 answers
179 views

Where would I go to use a reliably secure encrypted internet connection?

Lately, I’ve been paying $100 a month for Fios. I’m thinking of canceling this service because I rarely use my internet at home, since I’m at school most of the time and my college offers internet (...
cubed's user avatar
  • 33
45 votes
6 answers
11k views

Is the data between a keyboard and a web browser secure from local computer applications?

My question is about the text that I type on a keyboard while in a web browser. I understand that if the website has HTTPS the connection from my browser to the website is secure/encrypted, but what ...
Devil07's user avatar
  • 533
0 votes
1 answer
3k views

How can I tell if a keyboard for android is safe?

Background: I am a normal smart phone user, with no experience in information security. I want to download a new keyboard for my Android 6 phone off Google Play, as my current keyboard is not great. I ...
user avatar
1 vote
1 answer
304 views

Isn't Autohotkey effectively a keyspectator should I feel safe that I'm allowing this program to watch my keystrokes

Recently I started using Autohotkey just to automate some abbreviations so it's a hotstring e.g ::btw::by the way Replaces "btw" with "by the way" as soon as you press an default ...
Mark's user avatar
  • 235
0 votes
2 answers
564 views

iCloud Security Concern: browser session authentication storage after 2-factor?

Does anyone know how Safari or Chrome stores a www.icloud.com session authentication after logging in and passing 2-factor authentication? Is it stored in an encrypted cookie? My concern is, if ...
Nick's user avatar
  • 279
0 votes
1 answer
2k views

How can I detect possible spyware/keyloggers in my computer? [closed]

The reason is because of a recent data leak. I suspected that someone may have inserted keylogger to my computer. (a software, trojan). Some people think that the only way to really make sure there ...
user4234's user avatar
  • 139
1 vote
3 answers
4k views

Could a hardware keylogger be installed in a laptop keyboard replacement?

I recently purchased a keyboard replacement for my laptop, manufactured out of country. Is it theoretically possible for a hardware keylogger to be installed? If so, would it be possible to transmit ...
Throwaway's user avatar
0 votes
1 answer
573 views

Are auto-type features of password managers actually effective against keyloggers?

Of course if you think of a "keylogger" as a program that can only read keystrokes, then copy-pasting on the clipboard is going to be enough. But we know that keyloggers are not really only "logging ...
reed's user avatar
  • 15.9k
0 votes
1 answer
229 views

How to check if my PC's HTTPS/TLS connection is monitored or a key-logger is installed? [duplicate]

A few days ago, in the office, we were asked by our bosses to install a program. This was supposed to be an Antivirus program. But after installing this program many of our colleagues have been ...
Al-Alamin's user avatar
  • 121
1 vote
1 answer
453 views

Apple iPhone Security

How difficult it would be to install an application that could record users keystrokes on an Apple device, for example, an iPhone X, and send it online without the knowledge of the user.
cypher rock's user avatar
1 vote
0 answers
1k views

What data is bitmoji keyboard collecting about me?

Bitmoji is a virtual keyboard for iOS and Android to create personalized emojis (very paraphrased). I've found a few blogs looking at the permissions it requests and the privacy policy that it shares ...
Mike Ounsworth's user avatar
0 votes
2 answers
2k views

Refurbished laptop computer - any advice?

I just recently bought a refurbished laptop. I have seen stories of refurbished phones being sold with spyware, trojans etc installed on them. My question is, what steps should I take (outside of ...
DBroncos1558's user avatar
1 vote
2 answers
1k views

How to analyze malware to find out where keylogger sent data?

Recently my antivirus detected some keyloggers that infected my network. I have those malware files and I want to analyze them. How can I do this analysis? It is important to find out details like ...
R1W's user avatar
  • 1,627
0 votes
1 answer
2k views

How can I check if my second hand Apple wireless keyboard contains a keylogger?

I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
Ana-Maria's user avatar
3 votes
0 answers
232 views

Need Security advice on virtualization and windows security

I have a little doubt about the security of my virtual machine and Windows. Can anyone please point me in right direction? Below is my what, how and why I made my virtual machine. Let me tell you what ...
user3526312's user avatar

1
2 3 4 5